From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast Message Franking: From Invisible Salamanders to Encryptment., , , и . IACR Cryptology ePrint Archive, (2019)Partitioning Oracle Attacks., , и . USENIX Security Symposium, стр. 195-212. USENIX Association, (2021)Weak Fiat-Shamir Attacks on Modern Proof Systems., , , и . SP, стр. 199-216. IEEE, (2023)Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption., , , , и . CRYPTO (3), том 11694 из Lecture Notes in Computer Science, стр. 222-250. Springer, (2019)Zero-Knowledge Middleboxes., , , , и . IACR Cryptol. ePrint Arch., (2021)Anonymous, Robust Post-Quantum Public Key Encryption., , и . IACR Cryptol. ePrint Arch., (2021)Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More., , , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 379-407. Springer, (2023)Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks., , , и . IEEE Symposium on Security and Privacy, стр. 1067-1083. IEEE, (2019)Making encryption work in the cloud., и . Netw. Secur., 2014 (10): 8-10 (2014)Zombie: Middleboxes that Don't Snoop., , , , , и . IACR Cryptol. ePrint Arch., (2023)